Wednesday, January 3rd, 2018
Windows, Linux, and macOS have all received security patches that significantly alter how the operating systems handle virtual memory in order to protect against a hitherto undisclosed flaw. This is more than a little notable; it's been clear that Microsoft and the Linux kernel developers have been informed of some ...
Posted in Hardware, Linux, Security, Windows | No Comments
Wednesday, December 13th, 2017
Extended validation ("EV") certificates are a unique type of certificate issued by certificate authorities after more extensive validation of the entity requesting the certificate. In exchange for this more rigorous vetting, browsers show a special indicator like a green bar containing the company name, or in the case of Safari ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 16th, 2017
The Global Cyber Alliance (GCA)—an organization founded by law enforcement and research organizations to help reduce cyber-crime—has partnered with IBM and Packet Clearing House to launch a free public Domain Name Service system. That system is intended to block domains associated with botnets, phishing attacks, and other malicious Internet hosts—primarily ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, October 18th, 2017
Anyone with a Gmail account can now activate what the company calls "Advanced Protection," a set of features that make it harder to hack into your Google account. These are aimed specifically at "high-risk" users, as Google puts it. That is political campaign staffers, activists, journalists, or people in abusive ...
Posted in Internet, Security | No Comments
Monday, October 16th, 2017
A devastating weakness plagues the WPA2 protocol used to secure all modern Wi-Fi networks, and it can be abused to decrypt traffic from enterprise and consumer networks with varying degrees of difficulty.
Not only can attackers peek at supposedly encrypted traffic to steal credentials and payment card data, for example, but ...
Posted in Internet, Networking, Security | No Comments